TITLE

PSIM: Why the Enterprise Should Care

AUTHOR(S)
Elliott, David
PUB. DATE
October 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2010, Vol. 47 Issue 10, p76
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on the implementation of the Physical Security Information Management (PSIM) by the security organizations. It says that the PSIM system has provided help for the security personnel in terms of security and building services system s integration. It adds the interest of the security organizations for the implementation of the PSIM system in their business wherein video surveillance and access control systems are being installed.
ACCESSION #
54462607

 

Related Articles

  • A guide to access control for installers. Colombo, Allan B. // SDM: Security Distributing & Marketing;Aug98, Vol. 28 Issue 11, p100 

    Presents information on access control relating to the security of business enterprises. Information on the importance of the control of foot traffic in and out of corporations; Suggestions for the installation of an electronic access control system; Definition of the term access control;...

  • The Human Factor. Scaglione, Ben // Security: Solutions for Enterprise Security Leaders;Dec2011, Vol. 48 Issue 12, p36 

    The article focuses on the vital role of access control screener in securing facilities, places and entities. However, finding the correct personnel to control access and check identification is enormous, and it presents various challenges. Thus, the employer must see to it that a screener must...

  • A security tool with a message. Dix, John // Network World;5/14/2007, Vol. 24 Issue 19, p36 

    The article discusses the issue regarding the data leakage problem in an organization. According to the author, forwarding of information that violates policy or regulation by employees may put the company's computer security system at risk. An overview of Orchestria which addresses the...

  • Creating Security's Strategic Plan. Scaglione, Bernard // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p44 

    The author provides tips on how to create a strategic security plan. He cites the importance of considering the important elements in a security plan and defining the responsibilities and functions of the company's security department and personnel. The author advises to create an identification...

  • The Forgotten and Oft-Neglected Door Closer. Johnson, Joel // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p46 

    The author discusses the significance of using door closer. He explains the myriad of uses and functions of the door closer in electronic card access applications and in providing physical security, user convenience and compliance. Moreover, the author emphasizes the benefits of the door closer...

  • ZOOMING IN on security market. O'Malley, Chris // Indianapolis Business Journal;9/27/2010, Vol. 31 Issue 30, p3A 

    The article reports on the video surveillance technology offered by the Exacq Technologies Inc. in Indianapolis, Indiana. It states that the company provides various video surveillance platforms and technology, which helps businesses owners to manage their business without being on-site. The...

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • Why Access Control and Identification is Healthy for Your Organization. Scaglione, Ben // Security: Solutions for Enterprise Security Leaders;Oct2011, Vol. 48 Issue 10, p60 

    The article discusses the significance of access control and identification for the organizations in the U.S. The author mentions that controlling access into and within a building or campus not only detects possible terrorist attacks, but reduces the opportunity for the commission of a crime or...

  • Video Verification: Use it Wisely! Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Dec2010, Vol. 47 Issue 12, p42 

    The article discusses the importance of using video verification efficiently in security management in the U.S. It mentions that the use of video cameras in security systems verify whether an intrustion alarm is false or genuine. It states that video verification in electronic access control...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics